1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
77julia77 [94]
3 years ago
10

mapa mental con la explicación de que medios de comunicación y redes sociales intervienen en la construcción de tu identidad​

Computers and Technology
1 answer:
lisov135 [29]3 years ago
5 0

Answer:

este presente yo cuando me pidieron eso

You might be interested in
Celeste is writing a paper. However, two pages in, her computer shuts down unexpectedly. She never saved her paper, and all her
alekssr [168]
<span>Random access memory (RAM)</span>
8 0
3 years ago
Read 2 more answers
Two of the major sources used today for obtaining information to create computer maps are satellites and _____________.
nikdorinn [45]
The Global Positioning System or GPS.
7 0
2 years ago
Read 2 more answers
How did you generate a random number for the user to guess?
Verizon [17]

Answer:

B

Explanation:

The build in random function will work the best for your case. Have a marvelous day. :)

5 0
3 years ago
In information systems, _____ is information from a system that is used to make changes to input or processing activities.
Tom [10]

Answer:

"Feedback" is the correct answer for the above question.

Explanation:

  • Feedback is used in any information system or any communication system to tells that any process is doing in the right direction.
  • It is used in communication channels to tell the sender that the message is received by the receiver.
  • It is a type of message which is sent by the user to the system that he gets the correct or wrong output by that system.
  • The above question asked about the term which is used in the information system which suggests changing the processing activity. This is known as feedback which is described above.
6 0
3 years ago
which program monitors the computer by looking for known trouble makers as well as suspicious behavior​
lys-0071 [83]

Answer:

i think spyware because spyware can collect almost any type of data, including personal information like internet surfing habits, user logins, and bank or credit account information. Spyware can also interfere with a user's control of a computer by installing additional software or redirecting web browsers.

Explanation:

3 0
3 years ago
Other questions:
  • This is not school related in anyway but. I used to play this videogame on my computer years ago, but i cannot remember the name
    13·2 answers
  • How do you get 99 points on sunny meadows simulation?
    6·2 answers
  • What are the three business writing formats
    12·1 answer
  • Enter a formula using a database function to calculate the total value in the Cost column for expenses that meet the criteria in
    12·1 answer
  • A network slows down when a network card is locked in a perpetual mode
    12·2 answers
  • Jerry wants to save his company money. He decides to move to open source software for his word processing needs. Jerry then down
    5·1 answer
  • Exercise 4: Bring in program grades.cpp and grades.txt from the Lab 10 folder. Fill in the code in bold so that the data is prop
    12·1 answer
  • To excel at these professions, you need to be able to combine an eye for elegant design with a mind that delights in efficient o
    8·1 answer
  • Is the trust necessary to use an emerging technology platform? why?​
    10·1 answer
  • Question #8
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!